diff --git a/website/docs/r/fmg_firewall_security_policy.html.markdown b/website/docs/r/fmg_firewall_security_policy.html.markdown index a63839468..a9cf6074b 100644 --- a/website/docs/r/fmg_firewall_security_policy.html.markdown +++ b/website/docs/r/fmg_firewall_security_policy.html.markdown @@ -53,8 +53,10 @@ The following arguments are supported: * `schedule` - (Required) Schedule name. * `internet_service` - Enable/disable use of Destination Internet Services for this policy. * `internet_service_id` - Destination Internet Service ID. +* `internet_service_name` - Destination Internet Service Name. * `internet_service_src` - Enable/disable use of Source Internet Services for this policy. * `internet_service_src_id` - Source Internet Service ID. +* `internet_service_src_name` - Source Internet Service Name. * `users` - Names of individual users that can authenticate with this policy. * `groups` - Names of user groups that can authenticate with this policy. * `fsso` - Enable/disable Fortinet Single Sign-On. diff --git a/website/docs/r/fortios_system_apiuser.html.markdown b/website/docs/r/fortios_system_apiuser.html.markdown index d948ade67..8395d0bd7 100644 --- a/website/docs/r/fortios_system_apiuser.html.markdown +++ b/website/docs/r/fortios_system_apiuser.html.markdown @@ -147,13 +147,14 @@ This part provides a basic guideline to access FortiGate using terraform with a ```hcl provider "fortios" { - hostname = "192.168.52.177" - insecure = "true" - token = "GNH7r40H65GNb46kd4rG8rtrmn0fr1" - - peerauth = "enable" - clientcert = "client-cert.pem" - clientkey = "client-key.pem" + hostname = "myfirewall" + insecure = "false" + cabundlefile = "server.crt" + token = "GNH7r40H65GNb46kd4rG8rtrmn0fr1" + + peerauth = "enable" + clientcert = "client-cert.pem" + clientkey = "client-key.pem" } resource "fortios_firewall_address" "trname" {